CFP last date
22 April 2024
Reseach Article

Obscuring Mobile Agents by Source Code Obfuscation

by Veena Garg, Atul Srivastava, Atul Mishra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 9
Year of Publication: 2013
Authors: Veena Garg, Atul Srivastava, Atul Mishra
10.5120/9960-4925

Veena Garg, Atul Srivastava, Atul Mishra . Obscuring Mobile Agents by Source Code Obfuscation. International Journal of Computer Applications. 61, 9 ( January 2013), 46-50. DOI=10.5120/9960-4925

@article{ 10.5120/9960-4925,
author = { Veena Garg, Atul Srivastava, Atul Mishra },
title = { Obscuring Mobile Agents by Source Code Obfuscation },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 9 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 46-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number9/9960-4925/ },
doi = { 10.5120/9960-4925 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:08:42.078800+05:30
%A Veena Garg
%A Atul Srivastava
%A Atul Mishra
%T Obscuring Mobile Agents by Source Code Obfuscation
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 9
%P 46-50
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security and performance are most essential and prime challenges for networking phenomenon. Computation on the remote host is generally done through links. Thus security is needed when the code is on the way to the destination host. A program travelling over the link is extremely venerable to be forged for malfunctioning. On the other hand Software's are commonly distributed with all information in the code itself, for example java byte codes. Byte codes are easy to reverse engineer. Any rival company may get the algorithms and techniques used in the product. Therefore a protection is needed to keep information secret. In both the cases obfuscation seem to be promising solution to the problem. Obfuscation makes code less understandable without changing its functionality. In this paper we have proposed an obfuscator that converts source code of a mobile agent into unintelligible code. Whole paper mainly focuses on obfuscating mobile agents whereas the technique can be used for any software obfuscation.

References
  1. Hohl, F. A Framework to Protect Mobile Agents by Using Reference States:Technical Report Nr. 2000/03, Universitt Stuttgart, 2000.
  2. Farmer, W. , Guttman, J. , and Swarup V. Security for Mobile agents Authentication and State Appraisal. Fourth European Symposium on Research in Computer Security, pages 118-130, 1996.
  3. W. Jansen and T. Karygiannis. NIST special publication 800-19 – mobile agent security, 2000, National Institute of Standards Technology.
  4. Sander, T. , and Tschudin, C. F. Protecting Mobile Agents Against Malicious Hosts. Vigna G. (Ed. ) Mobile Agents and Security. Springer-Verlag, 1997.
  5. Riordan, J. , and Schneier, B. Environmental Key Generation Towards Clueless Agents. Vigna, G. (Ed. ), Mobile Agents and Security, Springer-Verlag, 1998.
  6. Vigna, G. Cryptographic Traces for Mobile Agents. In Vigna, G. (Ed. ): Mobile Agents and Security, pages 137-153, Springer-Verlag, 1998.
  7. Xudong Guan, Yiling Yang, Jinyuan You POM - A Mobile Agent Security Model against Malicious Hosts, Dept. of Computer Sci. & Eng. , Shanghai Jiaotong University, 200030, China.
  8. C. Collberg, C. Thomborson, and D. Low "A taxonomy of obfuscating transformations", Technical Report 148,Department of Computer Science, University of Auckla, July 1997.
  9. Sandhya Armoogum and Asvin Caully "Obfuscation Techniques for Mobile Agent code confidentiality", March 2010.
  10. Arini Balakrishnan, Chloe Schulze "Code Obfuscation Literature Survey" , December 19th, 2005.
  11. David Beasley, David R. Bull, Ralph R. Martin "An Overview of Genetic Algorithms: Part 2, Research Topics", University Computing,1993.
  12. S. Praveen and P. SojanLal "Array based java source code obfuscation using classes with restructured arrays", 2008.
  13. Andrej Brodnik, Milena Kova?, ?Spela Malovrh "Optimal representation of sparse matrices, University of Ljubljana,1999.
  14. S. Rugaber, K. Stirewalt, and L. Wills, "The Interleaving Problem in Program Understanding," 2nd Working Conference on Reverse Engineering, Toronto, Ontario, Canada, pp. 166-175, July 14-16 1995.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile agents network management network security obfuscation code confidentiality